Skip to main content
HomeTopicsR&D

R&D

Cybersecurity statistics about r&d

Showing 9261-9280 of 9942 results

Average remediation time for critical-severity KEVs improved by 50%, reducing from 60 days to 30 days.

CISA1/1/2025

SSL vulnerability remediation times improved significantly, dropping from 200 days in August 2022 to under 50 days in 2024.

CISA1/1/2025

66% of IT leaders agree outbound email security doesn’t get as much attention beyond compliance, but it is the silent security killer

Zivver1/1/2025

Top publicly exposed OT/ICS protocols observed in 2024 included Open Platform Communications Unified Architecture (OPC UA) – 43%, Distributed Network Protocol (DNP) – 22%, Niagara-Fox – 21%, Ethernet/IP – 10%, Modbus – 4%.

CISA1/1/2025
OTICS

When asked if they agree with the statement "We aren't sure if any employees are currently accessing GenAI sites today or what they are doing on these sites," 42% of organizations surveyed said they strongly agree, 40% said they agree, 7% said they neither agree nor disagree, 5% said they disagree, 5% said they strongly disagree.

Harmonic Security1/1/2025

Five sectors with the highest occurrences of exposed OT protocols were: Government Facilities – 63%, Information Technology – 10%, Energy – 10%, Healthcare and Public Health – 5%, Financial Services – 4%.

CISA1/1/2025

28% of federal contractors had at least one observable malware infection or compromised device on their networks in the past year.

SecurityScorecard1/1/2025

Of detected email threats, 11% were able to bypass email gateway scanners in Q3 2024, a 1% decrease compared to Q2 2024.

HP Wolf Security1/1/2025
Email threatsEmail gateway scanners

13.7% of CISOs said their compliance program is a 1 (“Initial: ad-hoc”), and 23% said their program is a 2 (“Established: documented and repeatable”).

RegScale1/1/2025
ComplianceCompliance progran

Third-party software & IT caused 50% of breaches at insurance companies.

SecurityScorecard1/1/2025

More than a third (37.8% of CISOs) said their relationship between compliance and security is in a phase of simple negotiations.

RegScale1/1/2025
ComplianceSecurity

Employees frequently send the wrong attachment (33%), misaddress emails to unintended recipients (32%), or misuse CC and BCC fields (20%). These mistakes are more likely to happen when employees are tight on time (54%), when they are stressed (40%), or when they feel overwhelmed by too many messages (40%).

Zivver1/1/2025

Malicious spreadsheets (e.g. XLS, XLSX) totaled 7% of threats detected in Q3 2024.

HP Wolf Security1/1/2025

The top 25% of organizations had at least 21% of their people using genAI apps, while the bottom 1% had just 1.7%.

Netskope1/1/2025

LockBit's victim count decreased from 176 in May 2024 to only five in December.

ReliaQuest1/1/2025

25.5% of CISOs assume current GRC processes are not broken.

RegScale1/1/2025
ComplianceProcess

Phishing attacks in Japan and Singapore rose by 37%.

Abnormal Security1/1/2025

66.7% of education businesses are challenged by audit readiness and their maturing compliance program.

RegScale1/1/2025
ComplianceAudit Management

Other types of data involved in policy violations include: intellectual property (16%), source code (13%), passwords and keys (11%), and encrypted data (1%).

Netskope1/1/2025

230 million of the breached passwords met standard complexity requirements, including length, capitalisation, numbers and special characters.

RegScale1/1/2025
ComplianceControl Mapping